207 research outputs found

    A Cybernetics Update for Competitive Deep Learning System

    Get PDF
    A number of recent reports in the peer-reviewed literature have discussed irreproducibility of results in biomedical research. Some of these articles suggest that the inability of independent research laboratories to replicate published results has a negative impact on the development of, and confidence in, the biomedical research enterprise. To get more resilient data and to achieve higher reproducible result, we present an adaptive and learning system reference architecture for smart learning system interface. To get deeper inspiration, we focus our attention on mammalian brain neurophysiology. In fact, from a neurophysiological point of view, neuroscientist LeDoux finds two preferential amygdala pathways in the brain of the laboratory mouse. The low road is a pathway which is able to transmit a signal from a stimulus to the thalamus, and then to the amygdala, which then activates a fast-response in the body. The high road is activated simultaneously. This is a slower road which also includes the cortical parts of the brain, thus creating a conscious impression of what the stimulus is (to develop a rational mechanism of defense for instance). To mimic this biological reality, our main idea is to use a new input node able to bind known information to the unknown one coherently. Then, unknown "environmental noise" or/and local "signal input" information can be aggregated to known "system internal control status" information, to provide a landscape of attractor points, which either fast or slow and deeper system response can computed from. In this way, ideal cybernetics system interaction levels can be matched exactly to practical system modeling interaction styles, with no paradigmatic operational ambiguity and minimal information loss. The present paper is a relevant contribute to classic cybernetics updating towards a new General Theory of Systems, a post-Bertalanffy Systemics

    The Entropy Conundrum: A Solution Proposal

    Get PDF
    In 2004, physicist Mark Newman, along with biologist Michael Lachmann and computer scientist Cristopher Moore, showed that if electromagnetic radiation is used as a transmission medium, the most information-efficient format for a given 1-D signal is indistinguishable from blackbody radiation. Since many natural processes maximize the Gibbs-Boltzmann entropy, they should give rise to spectra indistinguishable from optimally efficient transmission. In 2008, computer scientist C.S. Calude and physicist K. Svozil proved that "Quantum Randomness" is not Turing computable. In 2013, academic scientist R.A. Fiorini confirmed Newman, Lachmann and Moore's result, creating analogous example for 2-D signal (image), as an application of CICT in pattern recognition and image analysis. Paradoxically if you don’t know the code used for the message you can’t tell the difference between an information-rich message and a random jumble of letters. This is an entropy conundrum to solve. Even the most sophisticated instrumentation system is completely unable to reliably discriminate so called "random noise" from any combinatorically optimized encoded message, which CICT called "deterministic noise". Entropy fundamental concept crosses so many scientific and research areas, but, unfortunately, even across so many different disciplines, scientists have not yet worked out a definitive solution to the fundamental problem of the logical relationship between human experience and knowledge extraction. So, both classic concept of entropy and system random noise should be revisited deeply at theoretical and operational level. A convenient CICT solution proposal will be presented

    An Open Logic Approach to EPM

    Get PDF
    open2noEPM is a high operative and didactic versatile tool and new application areas are envisaged continuously. In turn, this new awareness has allowed to enlarge our panorama for neurocognitive system EPM is a high operative and didactic versatile tool and new application areas are envisaged continuosly. In turn, this new awareness has allowed to enlarge our panorama for neurocognitive system behavior understanding, and to develop information conservation and regeneration systems in a numeric self-reflexive/reflective evolutive reference framework. Unfortunately, a logically closed model cannot cope with ontological uncertainty by itself; it needs a complementary logical aperture operational support extension. To achieve this goal, it is possible to use two coupled irreducible information management subsystems, based on the following ideal coupled irreducible asymptotic dichotomy: "Information Reliable Predictability" and "Information Reliable Unpredictability" subsystems. To behave realistically, overall system must guarantee both Logical Closure and Logical Aperture, both fed by environmental "noise" (better
 from what human beings call "noise"). So, a natural operating point can emerge as a new Trans-disciplinary Reality Level, out of the Interaction of Two Complementary Irreducible Information Management Subsystems within their environment. In this way, it is possible to extend the traditional EPM approach in order to profit by both classic EPM intrinsic Self-Reflexive Functional Logical Closure and new numeric CICT Self-Reflective Functional Logical Aperture. EPM can be thought as a reliable starting subsystem to initialize a process of continuous self-organizing and self-logic learning refinement. understanding, and to develop information conservation and regeneration systems in a numeric self-reflexive/reflective evolutive reference framework. Unfortunately, a logically closed model cannot cope with ontological uncertainty by itself; it needs a complementary logical aperture operational support extension. To achieve this goal, it is possible to use two coupled irreducible information management subsystems, based on the following ideal coupled irreducible asymptotic dichotomy: "Information Reliable Predictability" and "Information Reliable Unpredictability" subsystems. To behave realistically, overall system must guarantee both Logical Closure and Logical Aperture, both fed by environmental "noise" (better
 from what human beings call "noise"). So, a natural operating point can emerge as a new Trans-disciplinary Reality Level, out of the Interaction of Two Complementary Irreducible Information Management Subsystems within their environment. In this way, it is possible to extend the traditional EPM approach in order to profit by both classic EPM intrinsic Self-Reflexive Functional Logical Closure and new numeric CICT Self-Reflective Functional Logical Aperture. EPM can be thought as a reliable starting subsystem to initialize a process of continuous self-organizing and self-logic learning refinement.Fiorini, Rodolfo; Degiacomo, PieroFiorini, Rodolfo; Degiacomo, Pier

    Research on the port competitiveness of ports participating in the Belt and Road Initiative

    Get PDF

    INFORMATION AND COMMUNICATION TECHNOLOGY AND (Good) GOVERNANCE:

    Get PDF
    In recent decades there has been a paradigm shift in Public Administrative thought from the classical ideas of government, to an approach which is seen as the future of governing termed Governance. This study sought to investigate whether or how Information and Communication Technology (ICT) is being employed within Public Administrative systems in terms of providing culturally responsive service which furthers the aims of governance and its practical end Good Governance. To focus the inquiry, the following two research questions were posed. Is Information and Communication Technology (ICT) being used as a tool in reshaping of public administrative systems in keeping with the structural and participatory demands of Governance/Good Governance? If ICT is being used toward the structural and participatory aims of Good Governance how are these changes responsive to, or reflective of, the environmental culture in which the administrative system operates? The, national ICT strategy documents and resulting ICT initiatives of the U.S.A, the Philippines, Guyana, Estonia, and Kenya were examined through the prism of the Governance Theory for intended use of ICT in organizational structure, participation, Knowledge Management and cultural responsiveness. Upon analysis of the material it was found that all five nations had intended to, and did use ICT to shape public sector organizational structure and to provide culturally responsive service. In so doing, these nations are furthering the aims of Good Governance as defined by Governance Theory.fi=OpinnÀytetyö kokotekstinÀ PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=LÀrdomsprov tillgÀngligt som fulltext i PDF-format

    Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks

    Get PDF
    With the advent of digital technology, computer networks have developed rapidly at an unprecedented pace contributing tremendously to social and economic development. They have become the backbone for all critical sectors and all the top Multi-National companies. Unfortunately, security threats for computer networks have increased dramatically over the last decade being much brazen and bolder. Intrusions or attacks on computers and networks are activities or attempts to jeopardize main system security objectives, which called as confidentiality, integrity and availability. They lead mostly in great financial losses, massive sensitive data leaks, thereby decreasing efficiency and the quality of productivity of an organization. There is a great need for an effective Network Intrusion Detection System (NIDS), which are security tools designed to interpret the intrusion attempts in incoming network traffic, thereby achieving a solid line of protection against inside and outside intruders. In this work, we propose to optimize a very popular soft computing tool prevalently used for intrusion detection namely Back Propagation Neural Network (BPNN) using a novel machine learning framework called “ISAGASAA”, based on Improved Self-Adaptive Genetic Algorithm (ISAGA) and Simulated Annealing Algorithm (SAA). ISAGA is our variant of standard Genetic Algorithm (GA), which is developed based on GA improved through an Adaptive Mutation Algorithm (AMA) and optimization strategies. The optimization strategies carried out are Parallel Processing (PP) and Fitness Value Hashing (FVH) that reduce execution time, convergence time and save processing power. While, SAA was incorporated to ISAGA in order to optimize its heuristic search. Experimental results based on Kyoto University benchmark dataset version 2015 demonstrate that our optimized NIDS based BPNN called “ANID BPNN-ISAGASAA” outperforms several state-of-art approaches in terms of detection rate and false positive rate. Moreover, improvement of GA through FVH and PP saves processing power and execution time. Thus, our model is very much convenient for network anomaly detection.

    Unmarried cohabitation and the constructive trust:an exercise in flawed equality

    Get PDF
    Cohabitation has become increasingly widespread, yet the law refuses to recognise the consequences of the breakdown of such relationships. The inaction of Parliament has left it to the courts to distribute proprietary rights based upon the law of trusts. However, the focus on purely financial contributions, penalises those who are most vulnerable. The most problematic consequence of this is that the approach taken to cohabitation replicates gender inequalities which are prevalent throughout society. Attempts to achieve formal equality and those discourses which indicate such an approach, have done nothing to achieve any form of ‘real’ equality. Unmarried cohabitation serves as an example of the wider implications of inequality, and demonstrates the potential for an approach which recognises difference to change social reality both within the legal sphere and without. Engaging in a desk-based inquiry which analyses case law and legislative proposals through a socio-historical lens allows for differing approaches to equality to be identified. Through this process, connections are drawn between the socio-legal construction of women, the rhetoric of the judiciary, and the equality approach adopted and implemented. This piece aims to demonstrate that formal equality is flawed. The law’s continued focus on the concept merely replicates the gendered nature of resolving cohabitation disputes, thus undermining equality in practice. What is necessary is for difference to be recognised, adopting an approach which lies between substantive and formal equality. This would allow for the recognition and alleviation of the gender bias inherent in both society and the CICT regime
    • 

    corecore